Cellebrite supports parsing data from approximately 22,000 applications. The Google Play Store and Apple App Store together host over 8.9 million apps. The gap between those two numbers is where exculpatory evidence disappears.
When Cellebrite or similar forensic tools encounter an app they do not have a parser for, one of two things happens — and neither is disclosed in the standard report:
The app's data folder is extracted from the device but not parsed into human-readable format. It exists in the raw extraction but never appears in any report — including the Reader file provided in discovery.
The tool attempts to parse the data using a generic template, producing inaccurate or misleading output. Timestamps may be wrong, message threads may be fragmented, and sender/recipient data may be reversed or missing.
In both cases, the government examiner typically has no awareness that this data exists or was missed. They report on what the software showed them — and the software showed them an incomplete picture.
Below is a short example of a demo extracted phone. Because the data wasn't extracted, the untrained investigator would have no idea how to look into the system files and retrieve the data.
Manual SQLite Analysis: Every app on a modern smartphone stores its data in SQLite database files. Even when forensic software cannot parse an app, the raw database files are typically present in the extraction. A trained analyst can open these files directly, query the tables, and recover data that automated tools never surfaced.
Forensic Cyber Investigations performs manual database-level analysis of the complete extraction — not just the parsed output. This means we examine the raw SQLite files for every app on the device, regardless of whether Cellebrite or Oxygen Forensic Detective has a parser for it. We have recovered exculpatory evidence from apps that the government's examiner did not know existed on the device.
Our analysis uses Cellebrite Inseyets, Oxygen Forensic Detective, and Magnet Forensics Axiom — the same tools used by government labs — combined with manual database forensics to ensure nothing is missed.
Contact Forensic Cyber Investigations for a free consultation on recovering exculpatory data from unsupported apps in your client's case.
Call (702) 359-2500